Security Affairs

CISA Adds Google Chromium Mojo Flaw to its Known Exploited Vulnerabilities Catalog

This week, Google has released out-of-band fixes to address a high-severity security vulnerability, tracked as CVE-2025-2783, in the Chrome browser for Windows. The flaw was actively exploited in attacks targeting organizations in Russia.

Attackers Target Deepseek Users With Fake Sponsored Google Ads to Deliver Malware

While DeepSeek is rising in popularity, threat actors are attempting to exploit it by using fake sponsored Google ads to distribute malware, Malwarebytes researchers warn. Attackers are using DeepSeek as a lure to trap unsuspecting Google searchers.

BlackLock Ransomware Operation Disrupted by Cybersecurity Firm

Resecurity discovered a local file inclusion flaw in the data leak site used by BlackLock Ransomware, allowing them to uncover clearnet IP addresses and other details about the cybercriminals' network, aiding in the investigation and disruption.

Critical Authentication Bypass Flaw Impacts VMware Tools for Windows

The vulnerability is due to improper access control. Low-privileged local attackers can exploit this vulnerability in simple attacks without user interaction to escalate privileges on vulnerable VMs.

Google Fixed the First Actively Exploited Chrome Zero-Day Since the Start of the Year

Google has released out-of-band fixes to address a high-severity security vulnerability, tracked as CVE-2025-2783, in Chrome browser for Windows. The flaw was actively exploited in attacks targeting organizations in Russia.

CERT-UA Warns of Cyber Espionage Against the Ukrainian Defense Industry Using DarkCrystal RAT

The CERT-UA uncovered a new cyber espionage campaign targeting employees of defense-industrial complex enterprises and representatives of the Defense Forces of Ukraine with DarkCrystal RAT through the Signal messenger.

Denmark Warns of Increased State-Sponsored Campaigns Targeting European Telcos

A new threat assessment by the Danish Social Security Agency warns that nation-state hackers have an extensive technical understanding of the telecommunications sector’s infrastructure and protocols in cyberattacks against the industry abroad.

CISA Adds Six Microsoft Windows Flaws to its Known Exploited Vulnerabilities Catalog

The CISA added six vulnerabilities in Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, tracked as CVE-2025-24983, CVE-2025-24984, CVE-2025-24985, CVE-2025-24991, CVE-2025-24993, and CVE-2025-26633.

Qilin Ransomware Gang Claims the Hack of the Ministry of Foreign Affairs of Ukraine

The group stated that it stole sensitive data such as private correspondence, personal information, and official decrees. The ransomware group declared that they had already sold some of the alleged stolen information to third parties.

Attackers Could Hack Smart Solar Systems and Cause Serious Damages

Experts say millions of solar units worldwide can be accessed due to these flaws, and they could have manipulated power supplies to cause blackouts, especially amid the ongoing hybrid warfare tensions involving Russia.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags